← Home
#research
28 stories tagged.
arXiv cs.CR: AutoRISE: Agent-Driven Strategy Evolution for Red-Teaming Large Language Models
1 min · 3 sources
arXiv cs.CR: DeepSignature: Digitally Signed, Content-Encoding Watermarks for Robust and Transparent Image Authentication
1 min · 3 sources
arXiv cs.CR: From Language to Logic: Bridging LLMs & Formal Representations for RTL Assertion Generation
1 min · 3 sources
arXiv cs.CR: Module Lattice Security (Part II): Module Lattice Reduction via Optimal Sign Selection
1 min · 3 sources
arXiv cs.CR: Reconstructive Authority Model: Runtime Execution Validity Under Partial Observability
1 min · 3 sources
arXiv cs.CR: Risk Models as Mediating Artifacts: A Postphenomenological Analysis of the CIIM Framework in Cybersecurity Practice
1 min · 3 sources
arXiv cs.CR: RouteGuard: Internal-Signal Detection of Skill Poisoning in LLM Agents
1 min · 3 sources
arXiv cs.CR: Secure eFPGA-Enabled Edge LLM Inference: Architectural and Hardware Countermeasures
1 min · 3 sources
arXiv cs.CR: Self-Supervised Learning for Android Malware Detection on a Time-Stamped Dataset
1 min · 3 sources
arXiv cs.CR: Training a General Purpose Automated Red Teaming Model
1 min · 3 sources
arXiv cs.CR: Automation-Exploit: A Multi-Agent LLM Framework for Adaptive Offensive Security with Digital Twin-Based Risk-Mitigated Exploitation
1 min · 3 sources
arXiv cs.CR: Behavioral Canaries: Auditing Private Retrieved Context Usage in RL Fine-Tuning
1 min · 3 sources
arXiv cs.CR: Can SOC Operators Explain their Decisions while Triaging Alarms? A Real-World Study
1 min · 3 sources
arXiv cs.CR: FixV2W: Correcting Invalid CVE-CWE Mappings with Knowledge Graph Embeddings
1 min · 3 sources
arXiv cs.CR: Introducing the Cyber-Physical Data Flow Diagram to Improve Threat Modelling of Internet of Things Devices
1 min · 3 sources
arXiv cs.CR: PrivSTRUCT: Untangling Data Purpose Compliance of Privacy Policies in Google Play Store
1 min · 3 sources
arXiv cs.CR: Resource-Aware Layered Intrusion Detection Allocation Model
1 min · 3 sources
arXiv cs.CR: Sovereign Agentic Loops: Decoupling AI Reasoning from Execution in Real-World Systems
1 min · 3 sources
arXiv cs.CR: Train in Vain: Functionality-Preserving Poisoning to Prevent Unauthorized Use of Code Datasets
1 min · 3 sources
arXiv cs.CR: Who Audits the Auditor? Tamper-Proof Fraud Detection with Blockchain-Anchored Explainable ML
1 min · 3 sources
Project Zero: On the Effectiveness of Mutational Grammar Fuzzing
1 min · 3 sources
Project Zero: A Deep Dive into the GetProcessHandleFromHwnd API
1 min · 3 sources
Project Zero: Bypassing Administrator Protection by Abusing UI Access
1 min · 3 sources
Project Zero: Breaking the Sound Barrier, Part II: Exploiting CVE-2024-54529
1 min · 3 sources
Project Zero: Bypassing Windows Administrator Protection
1 min · 3 sources
Project Zero: A 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby
1 min · 3 sources
Project Zero: Welcome to the new Project Zero Blog
1 min · 3 sources
Project Zero: Thinking Outside The Box [dusted off draft from 2017]
1 min · 3 sources